WGU D415 Software Defined Networking 69 Questions with
Verified Answers
Which task can be performed by an administrator using a network's automation
software? - CORRECT ANSWER Configuring multiple wireless access points
Which network configuration automation tool is written using C++, Clojure, and
Ruby? - CORRECT ANSWER Puppet
How does software-defined networking (SDN) affect information security? -
CORRECT ANSWER A single device can be configured for switching, routing, load
balancing, or security monitoring.
Which model involves moving services like load balancing, firewalls, and intrusion
prevention systems away from dedicated hardware into a non-physical
environment? - CORRECT ANSWER Network functions virtualization (NFV)
A network utilizes virtualized environments with virtual machines running delay-
sensitive applications.
Which recommendation should be used to protect the virtual workload in
accordance with NIST 800-125B? - CORRECT ANSWER Virtual firewalls should be
deployed for traffic flow control instead of physical firewalls.
A virtualized network uses a subnet-level virtual firewall.
Which recommendation should be used to protect the virtual workload in
accordance with NIST 800-125B? - CORRECT ANSWER The firewall should be
integrated with a virtualization management platform.
A network uses event logging for auditing purposes.
How should the audit records be managed according to the recommendations in
NIST 800-53? - CORRECT ANSWER Generate time stamps for audit records.
How has network functions virtualization (NFV) changed network functions? -
CORRECT ANSWER It has moved network functions from stand-alone appliances
to software running on any server.
, Which networking task would benefit from the use of network automation tools?
- CORRECT ANSWER Configuring multiple wireless access points
Which task can be performed by an administrator using a network's automation
software? - CORRECT ANSWER Add a firewall to the network.
Which financial benefit does network functions virtualization (NFV) offer to
carriers? - CORRECT ANSWER The opportunity for pay-as-you-go services without
a large up-front investment
What are the software applications within a network functions virtualization
(NFV) architecture that perform specific network tasks? - CORRECT ANSWER
Virtual network functions (VNFs)
How are network functions virtualization (NFV) and software-defined networks
(SDNs) related? - CORRECT ANSWER They are two network infrastructure
improvement models that are mutually beneficial and often used together.
Which concept is used to create differentiated access based on entitlement to
administer a network device or controller? - CORRECT ANSWER Role-based access
control (RBAC)
What are the advantages of using centralized network infrastructure? - CORRECT
ANSWER It helps in the easy deployment and management of systems and
devices within the network infrastructure.
What is a direct benefit of using network programmability instead of manual
configuration when implementing configuration changes? - CORRECT ANSWER
Reduced user error due to manual configuration
Which module of OpenStack should be used to improve efficiency and scalability
of user storage and unstructured data? - CORRECT ANSWER Swift
Which module of OpenStack should a developer use for the management of
various virtual machine images? - CORRECT ANSWER Glance
Verified Answers
Which task can be performed by an administrator using a network's automation
software? - CORRECT ANSWER Configuring multiple wireless access points
Which network configuration automation tool is written using C++, Clojure, and
Ruby? - CORRECT ANSWER Puppet
How does software-defined networking (SDN) affect information security? -
CORRECT ANSWER A single device can be configured for switching, routing, load
balancing, or security monitoring.
Which model involves moving services like load balancing, firewalls, and intrusion
prevention systems away from dedicated hardware into a non-physical
environment? - CORRECT ANSWER Network functions virtualization (NFV)
A network utilizes virtualized environments with virtual machines running delay-
sensitive applications.
Which recommendation should be used to protect the virtual workload in
accordance with NIST 800-125B? - CORRECT ANSWER Virtual firewalls should be
deployed for traffic flow control instead of physical firewalls.
A virtualized network uses a subnet-level virtual firewall.
Which recommendation should be used to protect the virtual workload in
accordance with NIST 800-125B? - CORRECT ANSWER The firewall should be
integrated with a virtualization management platform.
A network uses event logging for auditing purposes.
How should the audit records be managed according to the recommendations in
NIST 800-53? - CORRECT ANSWER Generate time stamps for audit records.
How has network functions virtualization (NFV) changed network functions? -
CORRECT ANSWER It has moved network functions from stand-alone appliances
to software running on any server.
, Which networking task would benefit from the use of network automation tools?
- CORRECT ANSWER Configuring multiple wireless access points
Which task can be performed by an administrator using a network's automation
software? - CORRECT ANSWER Add a firewall to the network.
Which financial benefit does network functions virtualization (NFV) offer to
carriers? - CORRECT ANSWER The opportunity for pay-as-you-go services without
a large up-front investment
What are the software applications within a network functions virtualization
(NFV) architecture that perform specific network tasks? - CORRECT ANSWER
Virtual network functions (VNFs)
How are network functions virtualization (NFV) and software-defined networks
(SDNs) related? - CORRECT ANSWER They are two network infrastructure
improvement models that are mutually beneficial and often used together.
Which concept is used to create differentiated access based on entitlement to
administer a network device or controller? - CORRECT ANSWER Role-based access
control (RBAC)
What are the advantages of using centralized network infrastructure? - CORRECT
ANSWER It helps in the easy deployment and management of systems and
devices within the network infrastructure.
What is a direct benefit of using network programmability instead of manual
configuration when implementing configuration changes? - CORRECT ANSWER
Reduced user error due to manual configuration
Which module of OpenStack should be used to improve efficiency and scalability
of user storage and unstructured data? - CORRECT ANSWER Swift
Which module of OpenStack should a developer use for the management of
various virtual machine images? - CORRECT ANSWER Glance